IT Password Policy - 2022
IT Password Policy - 2022
IT PASSWORD POLICY
Effective Date January 25, 2022 Policy Type Administrative
Responsibility Director, Information
Technology
Cross- Reference 1. Information Management,
Data Classification, Handling
Approver Executive Council and Retention Policy
Review Schedule Every 5 years Appendices 1. Password Requirements
1. Policy Statement
1.1 An important aspect of computer security is the safeguarding of personal and confidential
information of all individuals and organizations affiliated with Northwestern Polytechnic (“NWP”, or
“the Institution”). Properly chosen passwords by Institution system users will assist in the control
of access to systems and data.
2. Background
2.1 Poor password management can increase the risk of unauthorized access to the Institution’s
information systems and data. Ensuring that standards for password management are in place
can reduce these risks.
3. Policy Objective
3.1 The objective of this policy is to define the acceptable standards for password management at the
Institution.
4. Scope
5.1 “Account Lockout Duration” refers to a period of time an account cannot be used after the account
lockout threshold has been met.
5.2 “Account Lockout Threshold” refers to how many times an incorrect password can be used before
account is automatically disabled.
5.3 “Maximum Password Age” refers to the period of time since a password was set before it is
required to be changed.
Page 1 of 9
IT PASSWORD POLICY
5.4 “Minimum Password Age” refers to the period of time after changing a password before it can be
changed again.
5.5 “Minimum Password Length” refers to the smallest quantity of characters a password can contain
to be considered valid.
5.6 “Password” is a code, which, when associated with a user account, provides access to an IT
system or application, through an authentication mechanism or a login page.
5.7 “Password History” refers to a user’s previous passwords for the specified system.
5.8 “Password Vault” is software used to store and manage passwords securely.
5.9 “Privileged Accounts” are system or application accounts that have advanced permissions (as
compared to regular user account permissions) on such systems or applications. Examples of
user accounts with privileges include: administrative and super user accounts.
5.10 “Security Tokens” are logical codes or physical items that must be used in conjunction with a
password to successfully authenticate to an IT system. Examples of a security token include:
physical access passes; codes to be used on doors’ physical security keypads; PIN codes to be
used on smartphones; codes generated by “one-time password” device or software (usually used
for two-factor authentication).
5.11 “System or Application Accounts” are user ID’s created on IT systems or applications, which are
associated with specific access privileges on such systems and applications.
5.12 “Users” are students, employees, consultants, contractors, agents and authorized persons
accessing NWP IT systems and applications.
6.1 Users must protect passwords at all times against disclosure or unauthorized use, including when
generated, distributed, used and stored.
6.2 Passwords must follow a minimum set of security requirements including password length,
complexity, reuse, age and account lockout after unsuccessful authentication(s).
6.3 Passwords for Privileged Accounts must follow stronger requirements than regular user
passwords.
6.4 In addition to the guiding principles above, passwords must be created and managed in
accordance with the guidelines contained in Appendix 1.
Page 2 of 9
IT PASSWORD POLICY
7. Roles and Responsibilities
STAKEHOLDER ▪ RESPONSIBILITIES
Executive Council • Approve and formally support this policy.
Vice-President,
Finance and • Review and formally support this policy.
Administration
8.1 Exceptions to the guiding principles in this policy must be documented and formally approved by
the Director, Information Technology.
9. Inquiries
9.1 Inquiries regarding this policy can be directed to the Director, Information Technology.
Page 3 of 9
IT PASSWORD POLICY
10. Amendments (Revision History)
10.1 Amendments to this policy will be published from time to time and circulated to the community of
the institution.
Page 4 of 9
IT PASSWORD POLICY
APPENDIX 1
Appendix 1 - Password Requirements
1. Password Protection
1.1. All access and security codes such as passwords, Personal Identification Numbers (“PINs”)
and security tokens are considered as confidential information (as defined in the IT Data
Classification, Handling Policy) and must be protected and handled accordingly.
2. Password Lockout
2.1. The Account Lockout Threshold must be 5 consecutive invalid attempts or less
Page 5 of 9
IT PASSWORD POLICY
APPENDIX 1
3. Password Complexity
3.1. Passwords must combine a minimum length and the use of complex characters, as follows:
3.1.1. User account passwords should be at least 8 characters long and require the use of at
least 3 of the following 4 types of characters:
3.1.1.3. Numbers
3.1.2. Privileged Accounts, and systems or application accounts (accounts not attributed to a
physical person) should be at least 15 characters long and require the use of
uppercase and lowercase characters, numbers, as well as non-alphabetical
characters (such as punctuation characters, Unicode, or non-printable characters).
3.2. The following words or characters must not be used when selecting a password:
3.2.1. Names such as family names, username, equipment name, make or model
3.2.3. Numerical year or month abbreviations (2013, 2014, jan, feb, mar, apr, etc.)
3.2.4. The words “password”, “iloveyou”, “ilovenwp”, “admin”, “guest”, “trustno1”, and
“letmein”.
4. Password Changes
4.1. Passwords for Student accounts do not expire.
4.2. Service and application account passwords that remain static or cannot be changed
regularly (e.g. service accounts that are application code dependent) must be documented
and be protected with increased access controls.
4.3. New passwords must not be the same as one of the last 10 previously used, must not be
based on old passwords, and must sufficiently differ from previously used passwords by
changing a minimum of 4 characters.
4.4. Default vendor accounts and passwords (including “public”, “private”, “guest”, “administrator”,
“admin”, “system”, or any account that comes pre-configured with a vendor’s solution,
application or product) must be changed where possible, before a new system is
implemented in production, or within one month after becoming operational.
4.5. New user account passwords must be set up as one time use only (i.e. after generation of a
new account password, or when a user has requested a password reset, the user must be
required to select a new password after first authentication to the system).
4.6. A verification of the user’s identity must be performed by the IT Director, Help Desk, or
designate before granting a new password.
Page 6 of 9
IT PASSWORD POLICY
APPENDIX 1
4.7. All passwords associated with a terminated user, including the user’s accounts or any
shared accounts with administrative or high-level privileges that this user has been exposed
to, or that were known to this user, must be immediately reset.
7. Application Passwords
7.1. Application passwords must rely on network domain credentials where possible (Windows
Integrated Security).
7.2. When credentials used to authenticate to an application or a system are sent over a public
network or an external network (such as the Internet), passwords must be different from the
passwords used on the internal network. The following minimum settings must be enforced:
7.2.1. Password history: 10 last passwords used
Page 7 of 9
IT PASSWORD POLICY
APPENDIX 1
7.2.2. Maximum password age: 90 days
7.2.3. User account passwords: at least 8 characters long and require the use of uppercase
and lowercase characters, as well as numbers
7.2.4. User accounts with privileges, and systems or application accounts (accounts not
attributed to a physical person): at least 12 characters long and require the use of both
uppercase and lowercase characters, numbers, as well as non-alphabetical
characters (such as punctuation characters, Unicode, or non-printable characters)
7.2.5. Account lockout duration: 10 minutes
7.2.6. Account lockout threshold: 5 attempts
7.3. Authentication and encryption libraries that include strong encryption mechanisms must be
used to protect passwords.
7.4. Application coding platforms (ColdFusion, Java, .Net, C#, PHP, C++, etc.) as well as any
application technology that handle authentication mechanisms or passwords must be
updated with the latest available versions and all critical patches released by the vendor.
8. Smartphone Pass-codes
8.1. This section applies to smartphones or cellular phones that process professional email or
NWP information. The following minimum requirements must be enforced:
8.1.1. A pass-code is required to access each device
8.1.2. Pass-codes must be at least 6 characters long
8.1.3. New pass-codes must not be the same as one of the last 10 pass-codes used
8.1.4. Access to the device must be locked after 8 unsuccessful pass-codes entries, for a
duration of 5 minutes
8.1.5. Biometric authentication (3D Facial / Iris / Fingerprint) is acceptable as an alternative,
or in addition to, a pass-code.
9. Other Passwords
9.1. Voicemail Passwords or Voicemail PINs must:
9.1.1. Have a minimum of 6 numeric digits
9.1.2. Not be the same as the 5 previously used pins
9.1.3. Be locked after 3 incorrect attempts, with a 10 minute wait period
9.2. Remote access passwords used when connecting from an external or public network (such
as the Internet) must be:
9.2.1. At least 8 characters long and include uppercase and lowercase characters, as well as
numbers
9.2.2. Changed every 90 days when two-factor authentication is not used
9.2.3. Used in combination with a second factor token, where possible
9.2.4. Different from the domain password or any other passwords used within NWP, where
possible
9.3. Pre-shared keys used to connect to Wi-Fi networks must be:
9.3.1. At least 8 characters long and include both uppercase and lowercase characters
Page 8 of 9
IT PASSWORD POLICY
APPENDIX 1
9.3.2. Changed regularly
9.3.3. Unique to each Wi-Fi network, where possible
9.4. Using Microsoft Office passwords, PDF creator tools or Winzip / 7zip (with no encryption) is
only acceptable for the protection of non-confidential documents (as defined in the IT Data
Classification and Handling Policy).
Page 9 of 9